167 research outputs found

    Directional Sensitivity of Gaze-Collinearity Features in Liveness Detection

    Get PDF
    To increase the trust in using face recognition systems, these need to be capable of differentiating between face images captured from a real person and those captured from photos or similar artifacts presented at the sensor. Methods have been published for face liveness detection by measuring the gaze of a user while the user tracks an object on the screen, which appears at pre-defined, places randomly. In this paper we explore the sensitivity of such a system to different stimulus alignments. The aim is to establish whether there is such sensitivity and if so to explore how this may be exploited for improving the design of the stimulus. The results suggest that collecting feature points along the horizontal direction is more effective than the vertical direction for liveness detection

    Learning IoT without the "I" - Educational Internet of Things in a Developing Context

    Get PDF
    To provide better education to children from different socio-economic backgrounds, the Thai Government launched the "One Tablet PC Per Child" (OTPC) policy and distributed 800,000 tablet computers to first grade students across the country in 2012. This initiative is an opportunity to study how mobile learning and Internet of Things (IoT) technology can be designed for students in underprivileged areas of northern Thailand. In this position paper, we present a prototype, called OBSY (Observation Learning System) which targets primary science education. OBSY consists of i) a sensor device, developed with low-cost open source singled-board computer Raspberry Pi, housed in a 3D printed case, ii) a mobile device friendly graphical interface displaying visualisations of the sensor data, iii) a self-contained DIY Wi-Fi network which allows the system to operate in an environment with inadequate ICT infrastructure

    Age Sensitivity of Face Recognition Algorithms

    Get PDF
    This paper investigates the performance degradation of facial recognition systems due to the influence of age. A comparative analysis of verification performance is conducted for four subspace projection techniques combined with four different distance metrics. The experimental results based on a subset of the MORPH-II database show that the choice of subspace projection technique and associated distance metric can have a significant impact on the performance of the face recognition system for particular age groups

    Exploring the Internet of "Educational Things"(IoET) in rural underprivileged areas

    Get PDF

    Data Behind Mobile Behavioural Biometrics – a Survey

    Get PDF
    Behavioural biometrics are becoming more and more popular. It is hard to find a sensor that is embedded in a mobile/wearable device, which can’t be exploited to extract behavioural biometric data. In this paper, we investigate data in behavioural biometrics and how this data is used in experiments, especially examining papers that introduce new datasets. We will not examine performance accomplished by the algorithms used since a system’s performance is enormously affected by the data used, its amount and quality. Altogether, 32 papers are examined, assessing how often they are cited, have databases published, what modality data are collected, and how the data is used. We offer a roadmap that should be taken into account when designing behavioural data collection and using collected data. We further look at the General Data Protection Regulation, and its significance to the scientific research in the field of biometrics. It is possible to conclude that there is a need for publicly available datasets with comprehensive experimental protocols, similarly established in facial recognition

    Evaluation of stability of swipe gesture authentication across usage scenarios of mobile device

    Get PDF
    Background: User interaction with a mobile device predominantly consists of touch motions, otherwise known as swipe gestures, which are used as a behavioural biometric modality to verify the identity of a user. Literature reveals promising verification accuracy rates for swipe gesture authentication. Most of the existing studies have considered constrained environment in their experimental set-up. However, real-life usage of a mobile device consists of several unconstrained scenarios as well. Thus, our work aims to evaluate the stability of swipe gesture authentication across various usage scenarios of a mobile device. Methods: The evaluations were performed using state-of-the-art touch-based classification algorithms—support vector machine (SVM), k-nearest neighbour (kNN) and naive Bayes—to evaluate the robustness of swipe gestures across device usage scenarios. To simulate real-life behaviour, multiple usage scenarios covering stationary and dynamic modes are considered for the analysis. Additionally, we focused on analysing the stability of verification accuracy for time-separated swipes by performing intra-session (acquired on the same day) and inter-session (swipes acquired a week later) comparisons. Finally, we assessed the consistency of individual features for horizontal and vertical swipes using a statistical method. Results: Performance evaluation results indicate impact of body movement and environment (indoor and outdoor) on the user verification accuracy. The results reveal that for a static user scenario, the average equal error rate is 1%, and it rises significantly for the scenarios involving any body movement—caused either by user or the environment. The performance evaluation for time-separated swipes showed better verification accuracy rate for swipes acquired on the same day compared to swipes separated by a week. Finally, assessment on feature consistency reveal a set of consistent features such as maximum slope, standard deviation and mean velocity of second half of stroke for both horizontal and vertical swipes. Conclusions: The performance evaluation of swipe-based authentication shows variation in verification accuracy across different device usage scenarios. The obtained results challenge the adoption of swipe-based authentication on mobile devices. We have suggested ways to further achieve stability through specific template selection strategies. Additionally, our evaluation has established that at least 6 swipes are needed in enrolment to achieve acceptable accuracy. Also, our results conclude that features such as maximum slope and standard deviation are the most consistent features across scenarios

    Reclaiming the truth

    Get PDF

    Facial Spoofing Detection Using Temporal Texture Co-occurrence

    Get PDF
    Biometric person recognition systems based on facial images are increasingly used in a wide range of applications. However, the potential for face spoofing attacks remains a significant challenge to the security of such systems and finding better means of detecting such presentation attacks has become a necessity. In this paper, we propose a new spoofing detection method, which is based on temporal changes in texture information. A novel temporal texture descriptor is proposed to characterise the pattern of change in a short video sequence named Temporal Co-occurrence Adjacent Local Binary Pattern (TCoALBP). Experimental results using the CASIA-FA, Replay Attack and MSU-MFSD datasets; the proposed method shows the effectiveness of the proposed technique on these challenging datasets

    Spatio-Temporal Texture Features for Presentation Attack Detection in Biometric Systems

    Get PDF
    Spatio-temporal information is valuable as a discriminative cue for presentation attack detection, where the temporal texture changes and fine-grained motions (such as eye blinking) can be indicative of some types of spoofing attacks. In this paper, we propose a novel spatio-temporal feature, based on motion history, which can offer an efficient way to encapsulate temporal texture changes. Patterns of motion history are used as primary features followed by secondary feature extraction using Local Binary Patterns and Convolutional Neural Networks, and evaluated using the Replay Attack and CASIA-FASD datasets, demonstrating the effectiveness of the proposed approach

    On the Usability of Electroencephalographic Signals for Biometric Recognition: A Survey

    Get PDF
    Research on using electroencephalographic signals for biometric recognition has made considerable progress and is attracting growing attention in recent years. However, the usability aspects of the proposed biometric systems in the literatures have not received significant attention. In this paper, we present a comprehensive survey to examine the development and current status of various aspects of electroencephalography (EEG)-based biometric recognition. We first compare the characteristics of different stimuli that have been used for evoking biometric information bearing EEG signals. This is followed by a survey of the reported features and classifiers employed for EEG biometric recognition. To highlight the usability challenges of using EEG for biometric recognition in real-life scenarios, we propose a novel usability assessment framework which combines a number of user-related factors to evaluate the reported systems. The evaluation scores indicate a pattern of increasing usability, particularly in recent years, of EEG-based biometric systems as efforts have been made to improve the performance of such systems in realistic application scenarios. We also propose how this framework may be extended to take into account Aging effects as more performance data becomes available
    corecore